OPTIMIZING USE OF HARDWARE SECURITY MODULES

Use of cryptographic key-store hardware security modules is optimized in a system having a first scarce high-security key storage device and a second more plentiful low-security key storage device comprising securing a cryptographic key to the higher security level by initially storing the key in th...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: YELLEPEDDY, KRISHNA, KISHORE, PECK, JOHN, THOMAS, MORGANTI, JOHN, ANTHONY, HAZLEWOOD, KRISTIN, MARIE
Format: Patent
Sprache:eng ; fre
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!